Attack Life Cycle Changed By Cloud

Great video from BSides Columbus Ohio 2018 : “Zero to Owned in 1 Hour” That is an interesting review of how the new potential weaknesses are in the Cloud itself. Human Access to the cloud can be a weak point. AWS (Amazon Web Services) Does Multi-factor Authentication work with multiple people running things? Service Provider (cloud … Read more

More Security or More Business? is it Us vs Them?

When we say We need to be more secure in cyberland, does that mean small business needs to change what they do to be more secure? ISACA says we need governance: Governance and management for Enterprise business should use the COBIT 5 principles Principle 1: Meet stakeholder needs Principle 2: Covering the enterprise from end-to-end … Read more

Who is Responsible For Cybersecurity?

I am talking about the reality that someone must be responsible so we can hold their feet to the fire. We don’t want to get to the point of too many directions of responsibility, as then when a breach does happen it is dangerous to see what will happen from there? So the CISA (Certified … Read more